We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,134 results
  1. RM-RPL: reliable mobility management framework for RPL-based IoT systems

    This paper represents the Reliable Mobility Management of RPL (RM-RPL) protocol, specifically developed to overcome the limitations of the Routing...

    Ali Seyfollahi, Md Mainuddin, ... Ali Ghaffari in Cluster Computing
    Article 27 November 2023
  2. RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm

    The lack of a central controller, severe resource constraints, and multi-path data routing have turned data exchanges into one of the fundamental...

    Niloofar Zahedy, Behrang Barekatain, Alfonso Ariza Quintana in The Journal of Supercomputing
    Article 09 November 2023
  3. DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol

    Resource Attacks in the Internet of Things (IoT) target to attack resource-related things. It affects the memory, processing, energy, and battery of...

    Deepavathi Paganraj, Mala Chelliah in The Journal of Supercomputing
    Article 23 June 2024
  4. Data Dissemination Framework for Optimizing Overhead in IoT-Enabled Systems Using Tabu-RPL

    The IoT devices vary in terms of processing power, storage capacity, memory, and energy capabilities. These device heterogeneities pose unique...

    Vishnu Kumar Prajapati, T. P. Sharma, Lalit Kumar Awasthi in SN Computer Science
    Article 27 March 2024
  5. Performance analysis of RPL protocol in different nodes positioning using Contiki Cooja

    The routing protocol for low-power and lossy networks (RPL) protocol, tailored for the internet of things and wireless sensor networks, enhances...

    Vaibhav Ajayy, Virender Ranga in International Journal of Information Technology
    Article 18 June 2024
  6. RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments

    Time-slotted Channel Hop** (TSCH) Media Access Control (MAC) was specified to target the Industrial Internet of Things needs. This MAC balances...

    Ivanilson França Vieira Junior, Jorge Granjal, Marilia Curado in Journal of Network and Systems Management
    Article Open access 03 January 2024
  7. A novel RPL defense mechanism based on trust and deep learning for internet of things

    Along with the significant growth of applications and facilities provided by the Internet of Things (IoT) in recent years, security challenges and...

    Khatereh Ahmadi, Reza Javidan in The Journal of Supercomputing
    Article 18 April 2024
  8. Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case

    The rank value of a node in Routing Protocol for Low Power and Lossy Networks (RPL) plays a significant role in preventing loops and route...

    Ankur Bang, Udai Pratap Rao in SN Computer Science
    Article 15 April 2023
  9. DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN

    The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein malicious nodes selectively forward certain packets while...

    V. R. Rajasekar, S. Rajkumar in Cluster Computing
    Article 07 June 2024
  10. Machine Learning Based Intelligent RPL Attack Detection System for IoT Networks

    Routing Protocol for Low-Power and Lossy Networks (RPL) has been used in the Internet of Things (IoT) with Wireless Sensor Networks (WSNs), but it is...
    Chapter 2024
  11. An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security

    The internet of things (IoT) is a collection of systems connected to an online network consisting of things. Routing Protocol for Low-Power and...

    Mohammad Shirafkan, Ali Shahidinejad, Mostafa Ghobaei-Arani in Cluster Computing
    Article 26 December 2022
  12. Quality of Service Support in RPL Networks: Standing State and Future Prospects

    The development of IP-based Internet of Things (IoT) networks would facilitate more effective end-to-end IP network architectures, but it remains a...

    Article 31 March 2022
  13. Enhanced RPL to Control Congestion in IoT: A Review

    In recent years, Internet of things (IoT) has been used and contributed in various applications by connecting various devices to each other through...
    Aastha Maheshwari, Rajesh K. Yadav, Prem Nath in Internet of Things
    Conference paper 2023
  14. RPL-SVM: Making SVM Robust Against Missing Values and Partial Labels

    With increased data availability, data quality is the biggest problem in using AI models. The data may suffer from missing values and noisy values....
    Sreenivasan Mohandas, Naresh Manwani in PRICAI 2023: Trends in Artificial Intelligence
    Conference paper 2024
  15. Addressing DIO Suppression Attack in RPL based IoT Networks

    The Internet of Things (IoT) has brought a revolution in technology in the last decade. IoT is susceptible to numerous internal routing attacks...
    Rajat Kumar, Jyoti Grover, ... Abhishek Verma in Information Security, Privacy and Digital Forensics
    Conference paper 2024
  16. Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments

    The Routing Protocol for Low power and Lossy networks (RPL) utilises the Objective Function (OF) to form a Destination Oriented Directed Acyclic...

    Sakshi Garg, Deepti Mehrotra, ... Sujata Pandey in Cluster Computing
    Article 03 August 2022
  17. CQARPL: Congestion and QoS-aware RPL for IoT applications under heavy traffic

    The Internet of Things (IoT) provides a common platform to connect the heterogeneous devices over the internet. Hence, the number of devices...

    Farzaneh Kaviani, Mohammadreza Soltanaghaei in The Journal of Supercomputing
    Article 30 April 2022
  18. Mitigating the worst parent attack in RPL based internet of things

    The Low Power and Lossy Networks (LLNs) in the Internet of Things environment comprising constrained embedded devices have particular routing...

    Rashmi Sahay, G. Geethakumari, Barsha Mitra in Cluster Computing
    Article 15 January 2022
  19. Impact Analysis of Hello Flood Attack on RPL

    The Internet of Things (IoT) has a wide range of applications that improve our quality of life with smart things that can connect without human...
    Prashant Maurya, Vandana Kushwaha in Advanced Network Technologies and Intelligent Computing
    Conference paper 2023
  20. Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers

    Internet of Things (IoT) is becoming a crucial requirement for linking numerous physical devices or gadgets to the web. Due to large volume of data...

    P. S. Nandhini, S. Kuppuswami, ... R. DeviPriya in The Journal of Supercomputing
    Article 16 November 2022
Did you find what you were looking for? Share feedback.